Sura Khalil Abd, S. Al-Haddad, F. Hashim, Azizol Abdullah
{"title":"A review of cloud security based on cryptographic mechanisms","authors":"Sura Khalil Abd, S. Al-Haddad, F. Hashim, Azizol Abdullah","doi":"10.1109/ISBAST.2014.7013103","DOIUrl":null,"url":null,"abstract":"Recently, computer users can maintain their data and applications on the Internet and in the central remote server by using a technology called cloud computing. It is a kind of technology that allows users to access their personal files from any device provided with Internet services such technology offers even more applications to be utilized without installation. This paper presents a review of basic security challenges consisting of traditional security issues. It also discusses the additional challenges that take place as a result of using cloud computing model by providers and users of cloud systems. Furthermore, solutions suggested by some researchers are presented with a focus on cryptographic techniques that approve secure cloud storage.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISBAST.2014.7013103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Recently, computer users can maintain their data and applications on the Internet and in the central remote server by using a technology called cloud computing. It is a kind of technology that allows users to access their personal files from any device provided with Internet services such technology offers even more applications to be utilized without installation. This paper presents a review of basic security challenges consisting of traditional security issues. It also discusses the additional challenges that take place as a result of using cloud computing model by providers and users of cloud systems. Furthermore, solutions suggested by some researchers are presented with a focus on cryptographic techniques that approve secure cloud storage.